The Supply Chain Act comes into force at the beginning of 2023 and obliges large companies to document their production chains. Smart contracts and blockchain technology are one way to implement it.
Explore moreAny weak point in your own IT infrastructure can become a point of attack for a cyber attack with unforeseeable consequences. We therefore offer our Network Security Assessment especially for SMEs without their own IT security department.
Explore moreCompanies inevitably have to process personal data in their daily work. The General Data Protection Regulation (GDPR) imposes a number of requirements on data controllers to ensure IT security, which you should take into account.
Explore moreThe home office has become firmly established in the working world. It is therefore important to adapt the IT infrastructure in a timely and sustainable manner so that security is not neglected.
Explore moreAn intrusion detection system (IDS) is designed to protect a network from hacker attacks. It detects attacks and harmful actions based on unusual activities and warns those responsible, for example, by e-mail or SMS.
Explore moreEspecially those responsible for SMEs that do not have their own IT department should regularly deal with the IT security of their company, for example with a security concept in which minimum standards are defined.
Explore moreAny hacking attack on a company can have serious consequences. There are some indications that point to a cyber attack. Taking these seriously is crucial to minimise the threat of damage.
Explore moreDigital certificates are the basis for secure communication on the internet. They are used to authenticate communication partners and initialise encryption. Therefore, users should be familiar with some basics on this topic.
Explore moreThere is a charming idea behind open source: a developer makes the source code of his software available to the general public. The community may use the code free of charge, check it for errors, modify it and develop it further.
Explore morePrevention is one of the most important building blocks for the right behavior after an IT security incident.
Explore moreCloud security is increasingly becoming an elementary component of IT security in companies. Are you also thinking about outsourcing data or services to the cloud?
Explore moreThere are scenarios that would put almost any company in trouble. Regardless of a company's industry, size or organization, nearly all have one thing in common: dependence on a functioning infrastructure.
Explore moreA backup strategy is a bit like insurance. It costs time and money to deal with it. In some circumstances, it can even be a nuisance to put in the effort required for it.
Explore moreIt would certainly be possible to write a text about social engineering and social hacking that does not include the wisdom "Where people work, mistakes are made!
Explore more